ID

VAR-202007-1133


CVE

CVE-2020-6514


TITLE

Google Chrome Security hole

Trust: 0.6

sources: CNNVD: CNNVD-202007-1004

DESCRIPTION

Inappropriate implementation in WebRTC in Google Chrome prior to 84.0.4147.89 allowed an attacker in a privileged network position to potentially exploit heap corruption via a crafted SCTP stream. Google Chrome is a web browser developed by Google (Google). WebRTC is one of the components that supports browsers for real-time voice or video conversations. A security vulnerability exists in WebRTC in versions prior to Google Chrome 84.0.4147.89. An attacker could exploit this vulnerability to bypass security restrictions. For the stable distribution (buster), these problems have been fixed in version 68.11.0esr-1~deb10u1. We recommend that you upgrade your firefox-esr packages. For the detailed security status of firefox-esr please refer to its security tracker page at: https://security-tracker.debian.org/tracker/firefox-esr Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- iQIzBAEBCgAdFiEEtuYvPRKsOElcDakFEMKTtsN8TjYFAl8huUkACgkQEMKTtsN8 TjZrWRAAmJKPn+TnXVDcxt9OC/ko2aovs7IotOScCOvjO9Aez+l64cUEOAj4Zxc1 gd/CC/fW/LNudbmLrMKjGft3bFwi/78htATpgcJE5diEjEVlyvgMJiwvwoN+zOO2 1u4hgN6sYiBVnEKBOtS3wA0VGa19tW5mWXWZgtfmEMfuNpz3bUQ8ApQ48M47VdUO JjZbtTP92N8h99Mko3k2Z2xUDimRZ0xvVYXmEQ9lUzQnNpz0yKwSuo/GsjnH3l1n 2Y8ih+m9pCuYfcpXvWtLlQc70koS84MaAzdqYsp1xMpXLHzejDM/e0oDEJppBjwP 0U4qHSbirlwMHn1PSILFsDjYfTwSmFUqvmPb9mcPMnz60xuh6IT+2RUKXekBo263 1uhlHgqd5+hWYuWxQz7FgssJVUzfH2ZzaIoTRTYtTQVJmHeYViWf54AEGP36D6++ I8tNyCVTbDW+114dWjAmkuQ+yVjt0eSb4rqLqwcKxvNT6cCzRRJp2/tSsQCAvFdB dzExvQQMD/t4o+0BUYxani0jJf9DR9N7BoUBQdI0eZNV/mJ1BmDWXJqEpExhilfb 9QlI6oRu/Cw05BpkD1FKeXR+MgMKpi/jubhsYkZQcV9t7C0D/L13DEAqxr4zi4te eLLP/BQ3bl+h71ZHBCYCpbCc+joreguC3Z09IaDYFafewmOACHs= =QMwo -----END PGP SIGNATURE----- . 8.0) - ppc64le, x86_64 3. Description: Mozilla Thunderbird is a standalone mail and newsgroup client. Security Fix(es): * chromium-browser: Use after free in ANGLE (CVE-2020-6463) * chromium-browser: Inappropriate implementation in WebRTC (CVE-2020-6514) * Mozilla: Potential leak of redirect targets when loading scripts in a worker (CVE-2020-15652) * Mozilla: Memory safety bugs fixed in Firefox 79 and Firefox ESR 68.11 (CVE-2020-15659) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bugs fixed (https://bugzilla.redhat.com/): 1840893 - CVE-2020-6463 chromium-browser: Use after free in ANGLE 1857349 - CVE-2020-6514 chromium-browser: Inappropriate implementation in WebRTC 1861570 - CVE-2020-15652 Mozilla: Potential leak of redirect targets when loading scripts in a worker 1861572 - CVE-2020-15659 Mozilla: Memory safety bugs fixed in Firefox 79 and Firefox ESR 68.11 6. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 202007-64 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - https://security.gentoo.org/ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Severity: Normal Title: Mozilla Thunderbird: Multiple vulnerabilities Date: July 31, 2020 Bugs: #734978 ID: 202007-64 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Synopsis ======= Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could result in the arbitrary execution of code. Affected packages ================ ------------------------------------------------------------------- Package / Vulnerable / Unaffected ------------------------------------------------------------------- 1 mail-client/thunderbird < 68.11.0 >= 68.11.0 2 mail-client/thunderbird-bin < 68.11.0 >= 68.11.0 ------------------------------------------------------------------- 2 affected packages Description ========== Multiple vulnerabilities have been discovered in Mozilla Thunderbird. Please review the CVE identifiers referenced below for details. Impact ===== Please review the referenced CVE identifiers for details. Workaround ========= There is no known workaround at this time. Resolution ========= All Mozilla Thunderbird users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot -v ">=mail-client/thunderbird-68.11.0" All Mozilla Thunderbird binary users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot -v ">=mail-client/thunderbird-bin-68.11.0" References ========= [ 1 ] CVE-2020-15652 https://nvd.nist.gov/vuln/detail/CVE-2020-15652 [ 2 ] CVE-2020-15659 https://nvd.nist.gov/vuln/detail/CVE-2020-15659 [ 3 ] CVE-2020-6463 https://nvd.nist.gov/vuln/detail/CVE-2020-6463 [ 4 ] CVE-2020-6514 https://nvd.nist.gov/vuln/detail/CVE-2020-6514 [ 5 ] MFSA-2020-35 https://www.mozilla.org/en-US/security/advisories/mfsa2020-35/ Availability =========== This GLSA and any updates to it are available for viewing at the Gentoo Security Website: https://security.gentoo.org/glsa/202007-64 Concerns? ======== Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org. License ====== Copyright 2020 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. https://creativecommons.org/licenses/by-sa/2.5 . 8) - aarch64, ppc64le, x86_64 3. Background ========= Library for rendering dynamic web content in Qt5 C++ and QML applications. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ==================================================================== Red Hat Security Advisory Synopsis: Critical: chromium-browser security update Advisory ID: RHSA-2020:3377-01 Product: Red Hat Enterprise Linux Supplementary Advisory URL: https://access.redhat.com/errata/RHSA-2020:3377 Issue date: 2020-08-10 CVE Names: CVE-2020-6510 CVE-2020-6511 CVE-2020-6512 CVE-2020-6513 CVE-2020-6514 CVE-2020-6515 CVE-2020-6516 CVE-2020-6517 CVE-2020-6518 CVE-2020-6519 CVE-2020-6520 CVE-2020-6521 CVE-2020-6522 CVE-2020-6523 CVE-2020-6524 CVE-2020-6525 CVE-2020-6526 CVE-2020-6527 CVE-2020-6528 CVE-2020-6529 CVE-2020-6530 CVE-2020-6531 CVE-2020-6532 CVE-2020-6533 CVE-2020-6534 CVE-2020-6535 CVE-2020-6536 CVE-2020-6537 CVE-2020-6538 CVE-2020-6539 CVE-2020-6540 CVE-2020-6541 ==================================================================== 1. Summary: An update for chromium-browser is now available for Red Hat Enterprise Linux 6 Supplementary. Red Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, i686, x86_64 Red Hat Enterprise Linux HPC Node Supplementary (v. 6) - i686, x86_64 Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, i686, x86_64 Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, i686, x86_64 3. Description: Chromium is an open-source web browser, powered by WebKit (Blink). This update upgrades Chromium to version 84.0.4147.105. Security Fix(es): * chromium-browser: Heap buffer overflow in background fetch (CVE-2020-6510) * chromium-browser: Side-channel information leakage in content security policy (CVE-2020-6511) * chromium-browser: Type Confusion in V8 (CVE-2020-6512) * chromium-browser: Heap buffer overflow in PDFium (CVE-2020-6513) * chromium-browser: Inappropriate implementation in WebRTC (CVE-2020-6514) * chromium-browser: Use after free in tab strip (CVE-2020-6515) * chromium-browser: Policy bypass in CORS (CVE-2020-6516) * chromium-browser: Heap buffer overflow in history (CVE-2020-6517) * chromium-browser: Use after free in SCTP (CVE-2020-6532) * chromium-browser: Type Confusion in V8 (CVE-2020-6537) * chromium-browser: Inappropriate implementation in WebView (CVE-2020-6538) * chromium-browser: Use after free in CSS (CVE-2020-6539) * chromium-browser: Heap buffer overflow in Skia (CVE-2020-6540) * chromium-browser: Use after free in WebUSB (CVE-2020-6541) * chromium-browser: Use after free in developer tools (CVE-2020-6518) * chromium-browser: Policy bypass in CSP (CVE-2020-6519) * chromium-browser: Heap buffer overflow in Skia (CVE-2020-6520) * chromium-browser: Side-channel information leakage in autofill (CVE-2020-6521) * chromium-browser: Inappropriate implementation in external protocol handlers (CVE-2020-6522) * chromium-browser: Out of bounds write in Skia (CVE-2020-6523) * chromium-browser: Heap buffer overflow in WebAudio (CVE-2020-6524) * chromium-browser: Heap buffer overflow in Skia (CVE-2020-6525) * chromium-browser: Inappropriate implementation in iframe sandbox (CVE-2020-6526) * chromium-browser: Insufficient policy enforcement in CSP (CVE-2020-6527) * chromium-browser: Incorrect security UI in basic auth (CVE-2020-6528) * chromium-browser: Inappropriate implementation in WebRTC (CVE-2020-6529) * chromium-browser: Out of bounds memory access in developer tools (CVE-2020-6530) * chromium-browser: Side-channel information leakage in scroll to text (CVE-2020-6531) * chromium-browser: Type Confusion in V8 (CVE-2020-6533) * chromium-browser: Heap buffer overflow in WebRTC (CVE-2020-6534) * chromium-browser: Insufficient data validation in WebUI (CVE-2020-6535) * chromium-browser: Incorrect security UI in PWAs (CVE-2020-6536) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 After installing the update, Chromium must be restarted for the changes to take effect. 5. Bugs fixed (https://bugzilla.redhat.com/): 1857320 - CVE-2020-6511 chromium-browser: Side-channel information leakage in content security policy 1857321 - CVE-2020-6512 chromium-browser: Type Confusion in V8 1857322 - CVE-2020-6513 chromium-browser: Heap buffer overflow in PDFium 1857323 - CVE-2020-6515 chromium-browser: Use after free in tab strip 1857324 - CVE-2020-6516 chromium-browser: Policy bypass in CORS 1857325 - CVE-2020-6518 chromium-browser: Use after free in developer tools 1857326 - CVE-2020-6519 chromium-browser: Policy bypass in CSP 1857327 - CVE-2020-6520 chromium-browser: Heap buffer overflow in Skia 1857328 - CVE-2020-6521 chromium-browser: Side-channel information leakage in autofill 1857329 - CVE-2020-6523 chromium-browser: Out of bounds write in Skia 1857330 - CVE-2020-6524 chromium-browser: Heap buffer overflow in WebAudio 1857331 - CVE-2020-6525 chromium-browser: Heap buffer overflow in Skia 1857332 - CVE-2020-6526 chromium-browser: Inappropriate implementation in iframe sandbox 1857333 - CVE-2020-6527 chromium-browser: Insufficient policy enforcement in CSP 1857334 - CVE-2020-6528 chromium-browser: Incorrect security UI in basic auth 1857336 - CVE-2020-6529 chromium-browser: Inappropriate implementation in WebRTC 1857337 - CVE-2020-6530 chromium-browser: Out of bounds memory access in developer tools 1857338 - CVE-2020-6531 chromium-browser: Side-channel information leakage in scroll to text 1857339 - CVE-2020-6533 chromium-browser: Type Confusion in V8 1857340 - CVE-2020-6534 chromium-browser: Heap buffer overflow in WebRTC 1857341 - CVE-2020-6535 chromium-browser: Insufficient data validation in WebUI 1857342 - CVE-2020-6536 chromium-browser: Incorrect security UI in PWAs 1857349 - CVE-2020-6514 chromium-browser: Inappropriate implementation in WebRTC 1857351 - CVE-2020-6517 chromium-browser: Heap buffer overflow in history 1857352 - CVE-2020-6522 chromium-browser: Inappropriate implementation in external protocol handlers 1857400 - CVE-2020-6510 chromium-browser: Heap buffer overflow in background fetch 1861464 - CVE-2020-6537 chromium-browser: Type Confusion in V8 1861465 - CVE-2020-6538 chromium-browser: Inappropriate implementation in WebView 1861466 - CVE-2020-6532 chromium-browser: Use after free in SCTP 1861467 - CVE-2020-6539 chromium-browser: Use after free in CSS 1861468 - CVE-2020-6540 chromium-browser: Heap buffer overflow in Skia 1861469 - CVE-2020-6541 chromium-browser: Use after free in WebUSB 6. Package List: Red Hat Enterprise Linux Desktop Supplementary (v. 6): i386: chromium-browser-84.0.4147.105-2.el6_10.i686.rpm chromium-browser-debuginfo-84.0.4147.105-2.el6_10.i686.rpm i686: chromium-browser-84.0.4147.105-2.el6_10.i686.rpm chromium-browser-debuginfo-84.0.4147.105-2.el6_10.i686.rpm x86_64: chromium-browser-84.0.4147.105-2.el6_10.x86_64.rpm chromium-browser-debuginfo-84.0.4147.105-2.el6_10.x86_64.rpm Red Hat Enterprise Linux HPC Node Supplementary (v. 6): i686: chromium-browser-84.0.4147.105-2.el6_10.i686.rpm chromium-browser-debuginfo-84.0.4147.105-2.el6_10.i686.rpm x86_64: chromium-browser-84.0.4147.105-2.el6_10.x86_64.rpm chromium-browser-debuginfo-84.0.4147.105-2.el6_10.x86_64.rpm Red Hat Enterprise Linux Server Supplementary (v. 6): i386: chromium-browser-84.0.4147.105-2.el6_10.i686.rpm chromium-browser-debuginfo-84.0.4147.105-2.el6_10.i686.rpm i686: chromium-browser-84.0.4147.105-2.el6_10.i686.rpm chromium-browser-debuginfo-84.0.4147.105-2.el6_10.i686.rpm x86_64: chromium-browser-84.0.4147.105-2.el6_10.x86_64.rpm chromium-browser-debuginfo-84.0.4147.105-2.el6_10.x86_64.rpm Red Hat Enterprise Linux Workstation Supplementary (v. 6): i386: chromium-browser-84.0.4147.105-2.el6_10.i686.rpm chromium-browser-debuginfo-84.0.4147.105-2.el6_10.i686.rpm i686: chromium-browser-84.0.4147.105-2.el6_10.i686.rpm chromium-browser-debuginfo-84.0.4147.105-2.el6_10.i686.rpm x86_64: chromium-browser-84.0.4147.105-2.el6_10.x86_64.rpm chromium-browser-debuginfo-84.0.4147.105-2.el6_10.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2020-6510 https://access.redhat.com/security/cve/CVE-2020-6511 https://access.redhat.com/security/cve/CVE-2020-6512 https://access.redhat.com/security/cve/CVE-2020-6513 https://access.redhat.com/security/cve/CVE-2020-6514 https://access.redhat.com/security/cve/CVE-2020-6515 https://access.redhat.com/security/cve/CVE-2020-6516 https://access.redhat.com/security/cve/CVE-2020-6517 https://access.redhat.com/security/cve/CVE-2020-6518 https://access.redhat.com/security/cve/CVE-2020-6519 https://access.redhat.com/security/cve/CVE-2020-6520 https://access.redhat.com/security/cve/CVE-2020-6521 https://access.redhat.com/security/cve/CVE-2020-6522 https://access.redhat.com/security/cve/CVE-2020-6523 https://access.redhat.com/security/cve/CVE-2020-6524 https://access.redhat.com/security/cve/CVE-2020-6525 https://access.redhat.com/security/cve/CVE-2020-6526 https://access.redhat.com/security/cve/CVE-2020-6527 https://access.redhat.com/security/cve/CVE-2020-6528 https://access.redhat.com/security/cve/CVE-2020-6529 https://access.redhat.com/security/cve/CVE-2020-6530 https://access.redhat.com/security/cve/CVE-2020-6531 https://access.redhat.com/security/cve/CVE-2020-6532 https://access.redhat.com/security/cve/CVE-2020-6533 https://access.redhat.com/security/cve/CVE-2020-6534 https://access.redhat.com/security/cve/CVE-2020-6535 https://access.redhat.com/security/cve/CVE-2020-6536 https://access.redhat.com/security/cve/CVE-2020-6537 https://access.redhat.com/security/cve/CVE-2020-6538 https://access.redhat.com/security/cve/CVE-2020-6539 https://access.redhat.com/security/cve/CVE-2020-6540 https://access.redhat.com/security/cve/CVE-2020-6541 https://access.redhat.com/security/updates/classification/#critical 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2020 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBXzDrltzjgjWX9erEAQjq4A/9F+d6YmvVus3nDkp0gDfuzIt7/Vxs8Fu6 6iMLBHeBDyeiCzQ6s/uhRMfhOV8PpzR0fx60X4wJQAnS71c/XdHN6EhP6ZMPYyRe nO3rCiFx9EWNeQfkTXD5ngeGvcTjWPkhcH/Gm4C/BJ0HUmP8/FAwVSxHQ/cVah6h 4xfBf9NTRrt944tc+f/gScpuAk2JZMhGoc489tTkNXJ06wOQXPxypJV9GYiLNxoP 9dTv9xvvmTT0Pkct9L7aJyI6XWY2gr1gxfmxlZ0xZumlaOVi1Ug7JafhoKM6sNyV PSV7Ic4hJTKRtmdO9BWh4ja8fgKAsm7pYsiSMB2hc62qfjyXT3ANKBU6ZXfkaFeo 5Z2xCnaCl2rTN6gExxTC7md2gpPIikpF9uu+7PWhzZEKTgxVdsM+n8Yb2o9/W5j0 r/ggx7pt5dG06gDBUmN1Y2iny9opdFHdxcYkZWSa1K9JuRNL/uhuLIc5pVtZ2BEW /lwW7HXD1thdsCSueOiDHibf6RtDN0mieRFjfTJHA/wqb6pjfPJ+jk26nzsIVTbv 7JMiJYqYGxNORebhJ/425weveVaiBva8G6puY8hiNqnoe8AHCl7REg4/IpqWH88a eSXQHDCZGNIc2h9VRhobbZ6AD/yAu9dy711Eel/JhwOzGBZmUxNdv4O/ur4PT9FX BJye0FQqWD8=MNeg -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce

Trust: 1.71

sources: NVD: CVE-2020-6514 // VULHUB: VHN-184639 // VULMON: CVE-2020-6514 // PACKETSTORM: 168870 // PACKETSTORM: 168897 // PACKETSTORM: 158785 // PACKETSTORM: 158691 // PACKETSTORM: 158787 // PACKETSTORM: 161131 // PACKETSTORM: 158804

AFFECTED PRODUCTS

vendor:opensusemodel:backports slescope:eqversion:15.0

Trust: 1.0

vendor:applemodel:watchosscope:ltversion:6.2.8

Trust: 1.0

vendor:fedoraprojectmodel:fedorascope:eqversion:31

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:10.0

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:20.04

Trust: 1.0

vendor:applemodel:iphone osscope:ltversion:13.6

Trust: 1.0

vendor:applemodel:tvosscope:ltversion:13.4.8

Trust: 1.0

vendor:applemodel:ipadosscope:ltversion:13.6

Trust: 1.0

vendor:fedoraprojectmodel:fedorascope:eqversion:32

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:18.04

Trust: 1.0

vendor:opensusemodel:leapscope:eqversion:15.1

Trust: 1.0

vendor:googlemodel:chromescope:ltversion:84.0.4147.89

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:9.0

Trust: 1.0

vendor:opensusemodel:leapscope:eqversion:15.2

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:16.04

Trust: 1.0

vendor:applemodel:safariscope:ltversion:13.1.2

Trust: 1.0

sources: NVD: CVE-2020-6514

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2020-6514
value: MEDIUM

Trust: 1.0

CNNVD: CNNVD-202007-1004
value: MEDIUM

Trust: 0.6

VULHUB: VHN-184639
value: MEDIUM

Trust: 0.1

VULMON: CVE-2020-6514
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2020-6514
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.1

VULHUB: VHN-184639
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2020-6514
baseSeverity: MEDIUM
baseScore: 6.5
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: HIGH
availabilityImpact: NONE
exploitabilityScore: 2.8
impactScore: 3.6
version: 3.1

Trust: 1.0

sources: VULHUB: VHN-184639 // VULMON: CVE-2020-6514 // CNNVD: CNNVD-202007-1004 // NVD: CVE-2020-6514

PROBLEMTYPE DATA

problemtype:CWE-200

Trust: 1.1

sources: VULHUB: VHN-184639 // NVD: CVE-2020-6514

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202007-1004

TYPE

other

Trust: 0.6

sources: CNNVD: CNNVD-202007-1004

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-184639

PATCH

title:Google Chrome WebRTC Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=125058

Trust: 0.6

title:Red Hat: Important: firefox security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20203241 - Security Advisory

Trust: 0.1

title:Red Hat: Important: firefox security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20203229 - Security Advisory

Trust: 0.1

title:Red Hat: Important: firefox security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20203254 - Security Advisory

Trust: 0.1

title:Red Hat: Important: firefox security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20203253 - Security Advisory

Trust: 0.1

title:Red Hat: Important: thunderbird security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20203345 - Security Advisory

Trust: 0.1

title:Red Hat: Important: thunderbird security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20203342 - Security Advisory

Trust: 0.1

title:Red Hat: Important: thunderbird security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20203341 - Security Advisory

Trust: 0.1

title:Red Hat: Important: thunderbird security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20203344 - Security Advisory

Trust: 0.1

title:Red Hat: Important: thunderbird security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20203343 - Security Advisory

Trust: 0.1

title:Red Hat: Important: firefox security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20203233 - Security Advisory

Trust: 0.1

title:Arch Linux Issues: url:https://vulmon.com/vendoradvisory?qidtp=arch_linux_issues&qid=CVE-2020-6514 log

Trust: 0.1

title:Debian Security Advisories: DSA-4736-1 firefox-esr -- security updateurl:https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories&qid=f0293cff50ec970b1240b869491b449b

Trust: 0.1

title:Debian Security Advisories: DSA-4740-1 thunderbird -- security updateurl:https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories&qid=595ab9929be9ca4fd7754efd2b2ec848

Trust: 0.1

title:Amazon Linux 2: ALAS2-2020-1487url:https://vulmon.com/vendoradvisory?qidtp=amazon_linux2&qid=ALAS2-2020-1487

Trust: 0.1

title:Mozilla: Security Vulnerabilities fixed in Thunderbird 68.11url:https://vulmon.com/vendoradvisory?qidtp=mozilla_advisories&qid=daa10d2abc08ddc986002e2009e2ef07

Trust: 0.1

title:Mozilla: Security Vulnerabilities fixed in Firefox ESR 68.11url:https://vulmon.com/vendoradvisory?qidtp=mozilla_advisories&qid=66935b62c2e2168bbb42f9dd63ad34d0

Trust: 0.1

title:Mozilla: Security Vulnerabilities fixed in Firefox 79url:https://vulmon.com/vendoradvisory?qidtp=mozilla_advisories&qid=15e6443673318a4cf3c00441012bc7dc

Trust: 0.1

title:Mozilla: Security Vulnerabilities fixed in Thunderbird 78.1url:https://vulmon.com/vendoradvisory?qidtp=mozilla_advisories&qid=fc87c5012b2db6ab5335efa436ac2afc

Trust: 0.1

title:Mozilla: Security Vulnerabilities fixed in Firefox ESR 78.1url:https://vulmon.com/vendoradvisory?qidtp=mozilla_advisories&qid=bbe08934fa63c5502ec220a0ae5d4ed4

Trust: 0.1

title:Red Hat: Critical: chromium-browser security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20203377 - Security Advisory

Trust: 0.1

title:Google Chrome: Stable Channel Update for Desktopurl:https://vulmon.com/vendoradvisory?qidtp=chrome_releases&qid=e29f2c41a4d132c672708c0b908a9126

Trust: 0.1

title:Debian Security Advisories: DSA-4824-1 chromium -- security updateurl:https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories&qid=c8d0e8247116dce5f4c1a481beaa1df7

Trust: 0.1

title:CVE-2020-6514url:https://github.com/cudi1999/CVE-2020-6514

Trust: 0.1

title:PoC in GitHuburl:https://github.com/soosmile/POC

Trust: 0.1

title:PoC in GitHuburl:https://github.com/developer3000S/PoC-in-GitHub

Trust: 0.1

title:PoC in GitHuburl:https://github.com/hectorgie/PoC-in-GitHub

Trust: 0.1

title:PoC in GitHuburl:https://github.com/0xT11/CVE-POC

Trust: 0.1

sources: VULMON: CVE-2020-6514 // CNNVD: CNNVD-202007-1004

EXTERNAL IDS

db:NVDid:CVE-2020-6514

Trust: 2.5

db:PACKETSTORMid:158697

Trust: 1.8

db:PACKETSTORMid:158804

Trust: 0.8

db:PACKETSTORMid:158678

Trust: 0.7

db:PACKETSTORMid:158789

Trust: 0.7

db:PACKETSTORMid:158565

Trust: 0.7

db:CNNVDid:CNNVD-202007-1004

Trust: 0.7

db:AUSCERTid:ESB-2020.2703

Trust: 0.6

db:AUSCERTid:ESB-2020.2580

Trust: 0.6

db:AUSCERTid:ESB-2020.2743

Trust: 0.6

db:AUSCERTid:ESB-2020.2623

Trust: 0.6

db:AUSCERTid:ESB-2021.0024

Trust: 0.6

db:AUSCERTid:ESB-2020.2640

Trust: 0.6

db:AUSCERTid:ESB-2020.2410

Trust: 0.6

db:AUSCERTid:ESB-2020.2605

Trust: 0.6

db:AUSCERTid:ESB-2020.2851

Trust: 0.6

db:AUSCERTid:ESB-2020.2757

Trust: 0.6

db:AUSCERTid:ESB-2020.2675

Trust: 0.6

db:NSFOCUSid:50126

Trust: 0.6

db:PACKETSTORMid:158787

Trust: 0.2

db:PACKETSTORMid:158691

Trust: 0.2

db:PACKETSTORMid:158785

Trust: 0.2

db:PACKETSTORMid:158788

Trust: 0.1

db:PACKETSTORMid:158664

Trust: 0.1

db:PACKETSTORMid:158685

Trust: 0.1

db:PACKETSTORMid:158676

Trust: 0.1

db:PACKETSTORMid:158686

Trust: 0.1

db:PACKETSTORMid:158786

Trust: 0.1

db:PACKETSTORMid:158673

Trust: 0.1

db:CNVDid:CNVD-2020-43481

Trust: 0.1

db:VULHUBid:VHN-184639

Trust: 0.1

db:VULMONid:CVE-2020-6514

Trust: 0.1

db:PACKETSTORMid:168870

Trust: 0.1

db:PACKETSTORMid:168897

Trust: 0.1

db:PACKETSTORMid:161131

Trust: 0.1

sources: VULHUB: VHN-184639 // VULMON: CVE-2020-6514 // PACKETSTORM: 168870 // PACKETSTORM: 168897 // PACKETSTORM: 158785 // PACKETSTORM: 158691 // PACKETSTORM: 158787 // PACKETSTORM: 161131 // PACKETSTORM: 158804 // CNNVD: CNNVD-202007-1004 // NVD: CVE-2020-6514

REFERENCES

url:http://packetstormsecurity.com/files/158697/webrtc-usrsctp-incorrect-call.html

Trust: 2.4

url:https://chromereleases.googleblog.com/2020/07/stable-channel-update-for-desktop.html

Trust: 2.4

url:https://www.debian.org/security/2020/dsa-4736

Trust: 1.9

url:https://security.gentoo.org/glsa/202007-64

Trust: 1.9

url:https://security.gentoo.org/glsa/202101-30

Trust: 1.9

url:https://support.apple.com/kb/ht211288

Trust: 1.8

url:https://support.apple.com/kb/ht211290

Trust: 1.8

url:https://support.apple.com/kb/ht211291

Trust: 1.8

url:https://support.apple.com/kb/ht211292

Trust: 1.8

url:https://www.debian.org/security/2020/dsa-4740

Trust: 1.8

url:https://www.debian.org/security/2021/dsa-4824

Trust: 1.8

url:https://security.gentoo.org/glsa/202007-08

Trust: 1.8

url:https://crbug.com/1076703

Trust: 1.8

url:https://lists.debian.org/debian-lts-announce/2020/07/msg00027.html

Trust: 1.8

url:https://lists.debian.org/debian-lts-announce/2020/08/msg00006.html

Trust: 1.8

url:http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00041.html

Trust: 1.8

url:http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00069.html

Trust: 1.8

url:http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00008.html

Trust: 1.8

url:http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00007.html

Trust: 1.8

url:http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00011.html

Trust: 1.8

url:http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00018.html

Trust: 1.8

url:http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00022.html

Trust: 1.8

url:http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00025.html

Trust: 1.8

url:http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00032.html

Trust: 1.8

url:https://usn.ubuntu.com/4443-1/

Trust: 1.8

url:https://nvd.nist.gov/vuln/detail/cve-2020-6514

Trust: 1.3

url:https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/mtrpptkz2rkvh2xgqcwnfz7fogq5llca/

Trust: 1.1

url:https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/myidwchg24ztfd4p42d4a4wwppa74bcg/

Trust: 1.1

url:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/myidwchg24ztfd4p42d4a4wwppa74bcg/

Trust: 0.7

url:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/mtrpptkz2rkvh2xgqcwnfz7fogq5llca/

Trust: 0.7

url:https://vigilance.fr/vulnerability/chrome-multiple-vulnerabilities-32838

Trust: 0.6

url:https://vigilance.fr/vulnerability/webrtc-information-disclosure-via-internal-address-leak-32960

Trust: 0.6

url:http://www.nsfocus.net/vulndb/50126

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.2580/

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.2410/

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.2640/

Trust: 0.6

url:https://packetstormsecurity.com/files/158565/gentoo-linux-security-advisory-202007-08.html

Trust: 0.6

url:https://packetstormsecurity.com/files/158678/red-hat-security-advisory-2020-3241-01.html

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.2675/

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.2851/

Trust: 0.6

url:https://packetstormsecurity.com/files/158789/red-hat-security-advisory-2020-3345-01.html

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.2743/

Trust: 0.6

url:https://support.apple.com/en-us/ht211291

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.2623/

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.2703/

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.0024/

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.2757/

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.2605/

Trust: 0.6

url:https://packetstormsecurity.com/files/158804/red-hat-security-advisory-2020-3377-01.html

Trust: 0.6

url:https://support.apple.com/en-us/ht211290

Trust: 0.6

url:https://nvd.nist.gov/vuln/detail/cve-2020-15659

Trust: 0.5

url:https://nvd.nist.gov/vuln/detail/cve-2020-6463

Trust: 0.5

url:https://nvd.nist.gov/vuln/detail/cve-2020-15652

Trust: 0.5

url:https://www.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.3

url:https://access.redhat.com/security/team/contact/

Trust: 0.3

url:https://bugzilla.redhat.com/):

Trust: 0.3

url:https://access.redhat.com/security/team/key/

Trust: 0.3

url:https://access.redhat.com/articles/11258

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2020-6514

Trust: 0.3

url:https://www.debian.org/security/faq

Trust: 0.2

url:https://www.debian.org/security/

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2020-15652

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2020-15659

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2020-6463

Trust: 0.2

url:https://access.redhat.com/security/updates/classification/#important

Trust: 0.2

url:https://creativecommons.org/licenses/by-sa/2.5

Trust: 0.2

url:https://security.gentoo.org/

Trust: 0.2

url:https://bugs.gentoo.org.

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-6534

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-6532

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-6511

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-6510

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-6531

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-6524

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-6535

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-6533

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-6523

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-6526

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-6518

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-6512

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-6513

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-6530

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-6529

Trust: 0.2

url:https://cwe.mitre.org/data/definitions/200.html

Trust: 0.1

url:https://github.com/cudi1999/cve-2020-6514

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2020:3241

Trust: 0.1

url:https://security-tracker.debian.org/tracker/firefox-esr

Trust: 0.1

url:https://security-tracker.debian.org/tracker/thunderbird

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2020:3343

Trust: 0.1

url:https://www.mozilla.org/en-us/security/advisories/mfsa2020-35/

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2020:3341

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-6472

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-15966

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-6506

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-6467

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-6545

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-6571

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-6482

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-6475

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-6540

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-6470

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-6559

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-6471

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-15972

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-6576

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-15961

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-15977

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-16002

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-6573

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-15978

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-6549

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-15965

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-6487

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-6569

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-15992

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-15963

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-6551

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-6486

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-16001

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-15968

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-6483

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-6490

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-15960

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-15979

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-15989

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-16003

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-15987

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-6476

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-6480

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-15974

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-6548

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-6555

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-6550

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-6562

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-15976

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-6543

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-6474

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-15969

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-6575

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-6542

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-15964

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-6489

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-6481

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-6557

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-6544

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-15985

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-6473

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-15962

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-6561

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-15959

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-6570

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-6541

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-6516

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-6535

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-6515

Trust: 0.1

url:https://access.redhat.com/security/updates/classification/#critical

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-6536

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2020:3377

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-6529

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-6541

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-6511

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-6537

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-6517

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-6537

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-6522

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-6513

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-6531

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-6527

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-6536

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-6528

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-6526

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-6520

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-6540

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-6532

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-6525

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-6527

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-6520

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-6519

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-6522

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-6528

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-6512

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-6518

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-6521

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-6519

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-6515

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-6533

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-6539

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-6516

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-6538

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-6517

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-6521

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-6530

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-6525

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-6510

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-6534

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-6524

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-6523

Trust: 0.1

sources: VULHUB: VHN-184639 // VULMON: CVE-2020-6514 // PACKETSTORM: 168870 // PACKETSTORM: 168897 // PACKETSTORM: 158785 // PACKETSTORM: 158691 // PACKETSTORM: 158787 // PACKETSTORM: 161131 // PACKETSTORM: 158804 // CNNVD: CNNVD-202007-1004 // NVD: CVE-2020-6514

CREDITS

Natalie Silvanovich of Google Project Zero

Trust: 0.6

sources: CNNVD: CNNVD-202007-1004

SOURCES

db:VULHUBid:VHN-184639
db:VULMONid:CVE-2020-6514
db:PACKETSTORMid:168870
db:PACKETSTORMid:168897
db:PACKETSTORMid:158785
db:PACKETSTORMid:158691
db:PACKETSTORMid:158787
db:PACKETSTORMid:161131
db:PACKETSTORMid:158804
db:CNNVDid:CNNVD-202007-1004
db:NVDid:CVE-2020-6514

LAST UPDATE DATE

2026-02-06T23:06:36.345000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-184639date:2021-07-21T00:00:00
db:VULMONid:CVE-2020-6514date:2023-11-07T00:00:00
db:CNNVDid:CNNVD-202007-1004date:2021-11-03T00:00:00
db:NVDid:CVE-2020-6514date:2024-11-21T05:35:52.533

SOURCES RELEASE DATE

db:VULHUBid:VHN-184639date:2020-07-22T00:00:00
db:VULMONid:CVE-2020-6514date:2020-07-22T00:00:00
db:PACKETSTORMid:168870date:2020-07-28T19:12:00
db:PACKETSTORMid:168897date:2020-08-02T12:12:00
db:PACKETSTORMid:158785date:2020-08-06T17:06:24
db:PACKETSTORMid:158691date:2020-07-31T19:39:21
db:PACKETSTORMid:158787date:2020-08-06T17:06:39
db:PACKETSTORMid:161131date:2021-01-26T14:27:32
db:PACKETSTORMid:158804date:2020-08-10T14:26:27
db:CNNVDid:CNNVD-202007-1004date:2020-07-14T00:00:00
db:NVDid:CVE-2020-6514date:2020-07-22T17:15:13.447